about summary refs log tree commit diff
path: root/nixos/modules/services/scheduling
AgeCommit message (Collapse)AuthorFilesLines
2024-04-13nixos: remove all uses of lib.mdDocstuebinm3-12/+12
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
2023-06-24treewide: use optionalString instead of 'then ""'Felix Buehler1-1/+1
2022-07-30treewide: automatically md-convert option descriptionspennae3-18/+18
the conversion procedure is simple: - find all things that look like options, ie calls to either `mkOption` or `lib.mkOption` that take an attrset. remember the attrset as the option - for all options, find a `description` attribute who's value is not a call to `mdDoc` or `lib.mdDoc` - textually convert the entire value of the attribute to MD with a few simple regexes (the set from mdize-module.sh) - if the change produced a change in the manual output, discard - if the change kept the manual unchanged, add some text to the description to make sure we've actually found an option. if the manual changes this time, keep the converted description this procedure converts 80% of nixos options to markdown. around 2000 options remain to be inspected, but most of those fail the "does not change the manual output check": currently the MD conversion process does not faithfully convert docbook tags like <code> and <package>, so any option using such tags will not be converted at all.
2021-10-04nixos/doc: clean up defaults and examplesNaïm Favier1-1/+1
2021-09-18Merge pull request #126289 from rnhmjoj/wrappersGuillaume Girol2-1/+9
nixos/security/wrappers: make well-typed
2021-09-13nixos: explicitely set security.wrappers ownershiprnhmjoj2-1/+7
This is slightly more verbose and inconvenient, but it forces you to think about what the wrapper ownership and permissions will be.
2021-09-13nixos: add implict security.wrappers optionsrnhmjoj1-0/+2
This is to keep the same permissions/setuid/setgid as before the change in security.wrappers defaults.
2021-09-12nixos: define the primary group of users where neededGuillaume Girol1-1/+3
2021-05-01nixos/atd: prefer 'install' over 'mkdir/chmod/chown'Bjørn Forsman1-8/+3
I don't think there was a security issue here, but using 'install' is preferred. Ref #121293.
2020-08-15nixos/marathon: remove moduleFlorian Klink1-98/+0
The corresponding package failed to build for >9 months.
2020-08-15nixos/chronos: remove moduleFlorian Klink1-54/+0
The chronos package has been broken for > 9 months due to the breakage of the mesos package.
2020-03-21atd: systemd-udev-settle serves no purposePeter Hoeg1-2/+0
2020-01-06treewide: use attrs instead of list for types.loaOf optionsrnhmjoj2-9/+6
2019-10-12treewide: Switch to system usersJanne Heß1-1/+1
2019-09-01nixos: remove dependencies on local-fs.targetFlorian Klink1-1/+0
Since https://github.com/NixOS/nixpkgs/pull/61321, local-fs.target is part of sysinit.target again, meaning units without DefaultDependencies=no will automatically depend on it, and the manual set dependencies can be dropped.
2019-04-07Merge pull request #51918 from bobvanderlinden/var-runFlorian Klink1-2/+2
tree-wide: nixos: /var/run -> /run
2019-03-26nixos.cron: fix docstring sentenceBenjamin Hipple1-2/+2
2019-03-24nixos/fcron: /var/run -> /runBob van der Linden1-2/+2
2018-06-30nixos/modules: users.(extraUsers|extraGroup->users|group)Florian Klink4-5/+5
2018-05-06nixos/modules/services/scheduling/fcron: add setuid to fcrontabAlex Brandt1-0/+1
Without fcrontab being setuid, every attempt by an user in the fcron group to edit their own crontab (via `fcrontab -e`) results in the following error: ``` 2018-05-06 11:29:07 ERROR could not change euid to 273: Operation not permitted 2018-05-06 11:29:07 ERROR fcron child aborted: this does not affect the main fcron daemon, but this may prevent a job from being run or an email from being sent. ``` Adding setuid by hand has resolved this issue and aligns with the way fcrontab is installed on other distributions.
2017-12-31fcron module: be compatible with non-wrapped sendmail's, like opensmtpd'sLéo Gaspard1-10/+18
2017-10-16nixos/atd: remove "batch" from setuid wrappersBjørn Forsman1-1/+3
"batch" is a shell script so invoking it via setuid wrapper never worked anyway. (The kernel drops perms on executables with shebang.) A previous nixpkgs commit made "batch" invoke the NixOS setuid "at" wrapper to gain needed privileges. Thanks to @yesbox for noticing.
2017-10-09fcron module: fix use with hardlink-optimized storeLéo Gaspard1-1/+1
2017-10-09nixos/fcron: service needs fcron in PATHJoerg Thalheim1-4/+1
otherwise fcronsighup is not found. Set PATH to /run/current-system/sw/bin does not seems to be used by service file anyway.
2017-08-30cron service: fix reliance on etc.timezoneLinus Heckemann1-1/+1
This does not fully address the issue, as cron will not restart when the timezone is changed imperatively as it presumably needs to.
2017-04-23fcron: install systabJörg Thalheim1-1/+1
fixes #25072
2017-04-13fcron: do not chmod at allJörg Thalheim1-3/+5
fcron does handle permissions on its own correctly
2017-03-17nixos/treewide: remove boolean examples for optionsFranz Pletz1-1/+1
They contain no useful information and increase the length of the autogenerated options documentation. See discussion in #18816.
2017-03-05fcron: 3.1.2 -> 3.2.1Jörg Thalheim1-11/+39
fixes #23320 #23413
2017-02-15nixos/cron: unbreak since new security.wrapperBjørn Forsman1-1/+1
2017-02-15nixos/atd: unbreak after new security.wrappersBjørn Forsman1-3/+4
* convert list -> attrset * 'atd' doesn't exist, 'at' does
2017-01-29More derpParnell Springmeyer2-2/+2
2017-01-29Getting rid of the var indirection and using a bin path insteadParnell Springmeyer3-4/+4
2017-01-29Fixing a bunch of issuesParnell Springmeyer2-4/+2
2017-01-28Addressing PR feedbackParnell Springmeyer3-27/+6
2017-01-25setcap-wrapper: Merging with upstream master and resolving conflictsParnell Springmeyer2-2/+2
2016-09-13marathon service: remove use of network-interfaces.targetJoachim Fasting1-1/+1
2016-09-13chronos service: remove use of network-interfaces.targetJoachim Fasting1-1/+1
2016-09-01Adapting everything for the merged permissions wrappers work.Parnell Springmeyer3-6/+8
2016-09-01everything?: Updating every package that depended on the old setuidPrograms ↵Parnell Springmeyer2-2/+18
configuration.
2016-01-07jobs -> systemd.servicesRobin Gloster2-64/+58
2015-11-19services.cron.enable: Remove misleading defaultEelco Dolstra1-1/+1
Elsewhere we set it to "mkDefault (allFiles != [])" to the default has no effect.
2015-10-03build the crontab localy, there is nothing to gain from building it remotelymichael bishop1-1/+1
2015-07-24cron: Actually enable the service if enabledShea Levy1-1/+1
2015-07-22Use environment.etc to manage /etc/crontabEelco Dolstra1-7/+12
Otherwise, /etc/crontab won't be deleted when cron is disabled.
2015-07-22Don't enable cron by defaultEelco Dolstra1-27/+33
The rationale for disabling this is: 1) systemd timers are better; 2) it gets rid of one usually unnecessary process, which makes containers more light-weight. Note that cron is still enabled if services.cron.systemCronJobs is non-empty, so this only matters if you have no declarative cron jobs but do have user cron jobs.
2015-06-15types.uniq types.bool -> types.boolEelco Dolstra2-2/+2
2015-05-29Make it easy to override the marathon framework userrushmorem1-12/+21
Currently the module hardcodes the systemd service user to "marathon". With this change one would not need to create an extra systemd config to override the user. So why would one need to override the Marathon user? Some apps require root access to run. You can't run those with Marathon unless you override the default user to root. Marathon also provides a `--mesos_user` command line flag which allows you to run apps using arbitrary users. You need to run the framework as root to enable this functionality.
2015-05-21Update Marathon modulerushmorem1-9/+40
The new module makes it possible to pass extra commandline arguments to Marathon as well as environment variables.
2015-02-19Merge pull request #6452 from rushmorem/update-chronos-portJaka Hudoklin1-1/+1
Update chronos default port